E-Mail
IMAGE: Researchers from Shibaura Institute of Technology, Japan design a dual camera-based platform employing an omnidirectional camera for target detection and a separate camera for its high-resolution capture and report an. view more
Credit: Shibaura Institute of Technology, Japan
If you re a fan of spy movies, you ve probably come across scenes where the intelligence agents try to identify or detect a perpetrator using some sophisticated image enhancement technology on surveillance camera images. While the idea behind surveillance cameras and object detection is the same in real life, unlike in movies, there is often a trade-off between the camera s field-of-view and its resolution.
Cryptocurrencies like Bitcoin are becoming increasingly popular. Transactions are usually anonymous, fast and inexpensive. But in certain situations, fraud is possible, users can discover information about other users that should be kept secret, and sometimes delays occur. TU Wien has now developed an improved protocol which solves these problems.
E-Mail
IMAGE: Launch of SM-3 Block IB interceptor from guided-missile cruiser USS Lake Erie (CG 70). view more
Credit: U.S. Navy
From engineered pandemics to city-toppling cyber attacks to nuclear annihilation, life on Earth could radically change, and soon. Scientists will forecast the fate of the planet at a press conference during the 2021 APS April Meeting. Our Earth is 45 million centuries old. But this century is the first when one species ours can determine the biosphere s fate, said Martin Rees, the United Kingdom s Astronomer Royal and a founder of the Centre for the Study of Existential Risks at Cambridge University. Our globally-linked society is vulnerable to the unintended consequences of powerful new technologies not only nuclear, but (even more) biotech, cyber, advanced AI, space technology, he added.
E-Mail
Credit: BYU Photo
Using your face to unlock your phone is a pretty genius security protocol. But like any advanced technology, hackers and thieves are always up to the challenge, whether that s unlocking your phone with your face while you sleep or using a photo from social media to do the same.
Like every other human biometric identification system before it (fingerprints, retina scans) there are still significant security flaws in some of the most advanced identity verification technology. Brigham Young University electrical and computer engineering professor D.J. Lee has decided there is a better and more secure way to use your face for restricted access.